SlideShare uma empresa Scribd logo
1 de 16
Baixar para ler offline
Solving Problems with
Authentication
Yo Sub Kwon
Co-founder of Launchkey
Attacks
• Compromised credentials of a privileged account
• Direct access to cloud servers or hardware containing wallets or
credentials
• Compromised credentials on a mass scale of users with weak or
shared passwords
• Weak or compromised API keys
• Trojans and Keyloggers
• Bitcoin specialized malicious software
Kill Passwords
Along with many in
the industry, we feel
passwords and
simple bearer tokens
such as cookies are
no longer sufficient
to keep users safe
-Google Vice
President of Security
Eric Grosse
Using passwords for security
is no longer safe for people
-Jonathan LeBlanc, PayPal’s
head of global developer
advocacy
FIDO hopes to make passwords a
thing of the past
-Kayvan Alikhani, senior director of
technology at RSA
Passwords are insecure
• They’re inherently susceptible to brute-force attacks
• They are typically stored in-band on servers (and elsewhere) while a
knowledge factor of authentication is only effective so long as the
individual retains sole possession of that secret.
• They’re susceptible to human error by both the individuals that utilize
passwords and the developers that implement them
• Cracking hashed passwords becomes progressively easier with our
ever increasing computing power
• Due to password re-use, one password breach can result in obtaining
credentials for multiple unrelated services
Common Patches
• Minimum password requirements
• Password expirations
• More passwords
• One time passwords (OTP) as a second factor
• Social Media logins
Problems
• Passwords are insecure
• Multifactor authentication is technically complex
• Out of band hardware is costly
• New authentication measures can be disruptive to business
Solutions – Passwords are insecure
• Remove passwords
• Authentication using mobile devices (BYOD)
• Biometric authentication
• Physical devices such as USB keys or wearables
Solutions - Multifactor complexity
• Decentralize the layer of authentication
• Don’t do your own security
• Fidoalliance.org
Solutions – Disruptive to business
• Offer multiple options to login
• Passive factors of authentication
Conclusions
• Better security doesn’t need to be more difficult
• Placing patches on authentication problems is not future-proof
• Better security and easier to use authentication solutions do exist
Encourage the services you use to offer them for their sake and yours

Mais conteúdo relacionado

Mais procurados

IoT Security: Debunking the "We Aren't THAT Connected" Myth
IoT Security: Debunking the "We Aren't THAT Connected" MythIoT Security: Debunking the "We Aren't THAT Connected" Myth
IoT Security: Debunking the "We Aren't THAT Connected" MythSecurity Innovation
 
Two factor authentication 2018
Two factor authentication 2018Two factor authentication 2018
Two factor authentication 2018Will Adams
 
Plain talk about security public - ms1
Plain talk about security   public - ms1Plain talk about security   public - ms1
Plain talk about security public - ms1Mike Stone
 
Securing the Mobile Enterprise
Securing the Mobile EnterpriseSecuring the Mobile Enterprise
Securing the Mobile EnterpriseIBM Danmark
 
Design%20Considerations%20for%20Mobile%20Security[1]
Design%20Considerations%20for%20Mobile%20Security[1]Design%20Considerations%20for%20Mobile%20Security[1]
Design%20Considerations%20for%20Mobile%20Security[1]Vikash Lalsing (CITP)
 
The Zero Trust Model of Information Security
The Zero Trust Model of Information Security The Zero Trust Model of Information Security
The Zero Trust Model of Information Security Tripwire
 
IoT Product development Meetup
IoT Product development MeetupIoT Product development Meetup
IoT Product development MeetupItai Voller
 
Mobile Application Security Code Reviews
Mobile Application Security Code ReviewsMobile Application Security Code Reviews
Mobile Application Security Code ReviewsDenim Group
 
Session 4 Enterprise Mobile Security
Session 4  Enterprise Mobile SecuritySession 4  Enterprise Mobile Security
Session 4 Enterprise Mobile SecuritySantosh Satam
 
Mickey pacsec2016_final
Mickey pacsec2016_finalMickey pacsec2016_final
Mickey pacsec2016_finalPacSecJP
 
Enterprise Collaboration - 4
Enterprise Collaboration - 4Enterprise Collaboration - 4
Enterprise Collaboration - 4Nitin Kohli
 
Tim Willoughby presentation to cloud workshop 2016
Tim Willoughby presentation to cloud workshop 2016Tim Willoughby presentation to cloud workshop 2016
Tim Willoughby presentation to cloud workshop 2016Tim Willoughby
 
Identity-Based Privacy (IBP)
Identity-Based Privacy (IBP)Identity-Based Privacy (IBP)
Identity-Based Privacy (IBP)Igor Zboran
 
Insights 2015 - Cybersecurity- Game Planning for Success
Insights 2015 - Cybersecurity- Game Planning for SuccessInsights 2015 - Cybersecurity- Game Planning for Success
Insights 2015 - Cybersecurity- Game Planning for SuccessWindham Brannon
 
Modern Cyber Threat Protection techniques for Enterprises
Modern Cyber Threat Protection techniques for EnterprisesModern Cyber Threat Protection techniques for Enterprises
Modern Cyber Threat Protection techniques for EnterprisesAbhinav Biswas
 
ESET: Delivering Benefits to Enterprises
ESET: Delivering Benefits to EnterprisesESET: Delivering Benefits to Enterprises
ESET: Delivering Benefits to EnterprisesESET
 
Essential MDM configurations
Essential MDM configurationsEssential MDM configurations
Essential MDM configurationsPeter Hewer
 

Mais procurados (20)

IoT Security: Debunking the "We Aren't THAT Connected" Myth
IoT Security: Debunking the "We Aren't THAT Connected" MythIoT Security: Debunking the "We Aren't THAT Connected" Myth
IoT Security: Debunking the "We Aren't THAT Connected" Myth
 
Two factor authentication 2018
Two factor authentication 2018Two factor authentication 2018
Two factor authentication 2018
 
Plain talk about security public - ms1
Plain talk about security   public - ms1Plain talk about security   public - ms1
Plain talk about security public - ms1
 
Securing the Mobile Enterprise
Securing the Mobile EnterpriseSecuring the Mobile Enterprise
Securing the Mobile Enterprise
 
Design%20Considerations%20for%20Mobile%20Security[1]
Design%20Considerations%20for%20Mobile%20Security[1]Design%20Considerations%20for%20Mobile%20Security[1]
Design%20Considerations%20for%20Mobile%20Security[1]
 
The Zero Trust Model of Information Security
The Zero Trust Model of Information Security The Zero Trust Model of Information Security
The Zero Trust Model of Information Security
 
IoT Product development Meetup
IoT Product development MeetupIoT Product development Meetup
IoT Product development Meetup
 
Mobile Application Security Code Reviews
Mobile Application Security Code ReviewsMobile Application Security Code Reviews
Mobile Application Security Code Reviews
 
Session 4 Enterprise Mobile Security
Session 4  Enterprise Mobile SecuritySession 4  Enterprise Mobile Security
Session 4 Enterprise Mobile Security
 
Hacking Mobile Apps
Hacking Mobile AppsHacking Mobile Apps
Hacking Mobile Apps
 
Mickey pacsec2016_final
Mickey pacsec2016_finalMickey pacsec2016_final
Mickey pacsec2016_final
 
Enterprise Collaboration - 4
Enterprise Collaboration - 4Enterprise Collaboration - 4
Enterprise Collaboration - 4
 
Tim Willoughby presentation to cloud workshop 2016
Tim Willoughby presentation to cloud workshop 2016Tim Willoughby presentation to cloud workshop 2016
Tim Willoughby presentation to cloud workshop 2016
 
Identity-Based Privacy (IBP)
Identity-Based Privacy (IBP)Identity-Based Privacy (IBP)
Identity-Based Privacy (IBP)
 
Insights 2015 - Cybersecurity- Game Planning for Success
Insights 2015 - Cybersecurity- Game Planning for SuccessInsights 2015 - Cybersecurity- Game Planning for Success
Insights 2015 - Cybersecurity- Game Planning for Success
 
Ransomware ly
Ransomware lyRansomware ly
Ransomware ly
 
Electronic security
Electronic securityElectronic security
Electronic security
 
Modern Cyber Threat Protection techniques for Enterprises
Modern Cyber Threat Protection techniques for EnterprisesModern Cyber Threat Protection techniques for Enterprises
Modern Cyber Threat Protection techniques for Enterprises
 
ESET: Delivering Benefits to Enterprises
ESET: Delivering Benefits to EnterprisesESET: Delivering Benefits to Enterprises
ESET: Delivering Benefits to Enterprises
 
Essential MDM configurations
Essential MDM configurationsEssential MDM configurations
Essential MDM configurations
 

Destaque

Bitcoin, Blockchain & Beyond
Bitcoin, Blockchain & BeyondBitcoin, Blockchain & Beyond
Bitcoin, Blockchain & BeyondMecklerMedia
 
Steve beauregard keynote
Steve beauregard keynoteSteve beauregard keynote
Steve beauregard keynoteMecklerMedia
 
Buy and Sell By paymium
Buy and Sell By paymiumBuy and Sell By paymium
Buy and Sell By paymiumLaFrenchMobile
 
Pdf guerrilla marketing
Pdf guerrilla marketingPdf guerrilla marketing
Pdf guerrilla marketingMecklerMedia
 
Bitcoin Payment Focus
Bitcoin Payment Focus Bitcoin Payment Focus
Bitcoin Payment Focus MecklerMedia
 
Inside 3 d printing metamoderism, leslie oliver karpas (save small)
Inside 3 d printing   metamoderism, leslie oliver karpas (save small)Inside 3 d printing   metamoderism, leslie oliver karpas (save small)
Inside 3 d printing metamoderism, leslie oliver karpas (save small)MecklerMedia
 
151021 metamason 10 page competition pitch
151021   metamason 10 page competition pitch151021   metamason 10 page competition pitch
151021 metamason 10 page competition pitchMecklerMedia
 
Bitcoin Past Present Future
Bitcoin Past Present FutureBitcoin Past Present Future
Bitcoin Past Present FutureMecklerMedia
 
Développer un serveur de micropayment bitcoin - REX sur 2 implémentations - O...
Développer un serveur de micropayment bitcoin - REX sur 2 implémentations - O...Développer un serveur de micropayment bitcoin - REX sur 2 implémentations - O...
Développer un serveur de micropayment bitcoin - REX sur 2 implémentations - O...Vidal Chriqui
 
A copyright protection technology for 3 d printing models (john choi)
A copyright protection technology for 3 d printing models (john choi)A copyright protection technology for 3 d printing models (john choi)
A copyright protection technology for 3 d printing models (john choi)MecklerMedia
 
From Bitcoin Hardware Wallets to Personal Privacy Devices
From Bitcoin Hardware Wallets to Personal Privacy DevicesFrom Bitcoin Hardware Wallets to Personal Privacy Devices
From Bitcoin Hardware Wallets to Personal Privacy DevicesMecklerMedia
 
Cloud infrastructure of 3 d printing
Cloud infrastructure of 3 d printingCloud infrastructure of 3 d printing
Cloud infrastructure of 3 d printingMecklerMedia
 
Bitcoin: Repenser la monnaie (Bitcoin: rethinking money)
Bitcoin: Repenser la monnaie (Bitcoin: rethinking money)Bitcoin: Repenser la monnaie (Bitcoin: rethinking money)
Bitcoin: Repenser la monnaie (Bitcoin: rethinking money)FrancisPouliot
 
Les Alternatives à la Blockchain
Les Alternatives à la BlockchainLes Alternatives à la Blockchain
Les Alternatives à la BlockchainCyril Grunspan
 

Destaque (15)

Bitcoin, Blockchain & Beyond
Bitcoin, Blockchain & BeyondBitcoin, Blockchain & Beyond
Bitcoin, Blockchain & Beyond
 
Steve beauregard keynote
Steve beauregard keynoteSteve beauregard keynote
Steve beauregard keynote
 
Buy and Sell By paymium
Buy and Sell By paymiumBuy and Sell By paymium
Buy and Sell By paymium
 
Pdf guerrilla marketing
Pdf guerrilla marketingPdf guerrilla marketing
Pdf guerrilla marketing
 
Bitcoin Payment Focus
Bitcoin Payment Focus Bitcoin Payment Focus
Bitcoin Payment Focus
 
Inside 3 d printing metamoderism, leslie oliver karpas (save small)
Inside 3 d printing   metamoderism, leslie oliver karpas (save small)Inside 3 d printing   metamoderism, leslie oliver karpas (save small)
Inside 3 d printing metamoderism, leslie oliver karpas (save small)
 
151021 metamason 10 page competition pitch
151021   metamason 10 page competition pitch151021   metamason 10 page competition pitch
151021 metamason 10 page competition pitch
 
Bitcoin Past Present Future
Bitcoin Past Present FutureBitcoin Past Present Future
Bitcoin Past Present Future
 
The Cognitive Era
The Cognitive EraThe Cognitive Era
The Cognitive Era
 
Développer un serveur de micropayment bitcoin - REX sur 2 implémentations - O...
Développer un serveur de micropayment bitcoin - REX sur 2 implémentations - O...Développer un serveur de micropayment bitcoin - REX sur 2 implémentations - O...
Développer un serveur de micropayment bitcoin - REX sur 2 implémentations - O...
 
A copyright protection technology for 3 d printing models (john choi)
A copyright protection technology for 3 d printing models (john choi)A copyright protection technology for 3 d printing models (john choi)
A copyright protection technology for 3 d printing models (john choi)
 
From Bitcoin Hardware Wallets to Personal Privacy Devices
From Bitcoin Hardware Wallets to Personal Privacy DevicesFrom Bitcoin Hardware Wallets to Personal Privacy Devices
From Bitcoin Hardware Wallets to Personal Privacy Devices
 
Cloud infrastructure of 3 d printing
Cloud infrastructure of 3 d printingCloud infrastructure of 3 d printing
Cloud infrastructure of 3 d printing
 
Bitcoin: Repenser la monnaie (Bitcoin: rethinking money)
Bitcoin: Repenser la monnaie (Bitcoin: rethinking money)Bitcoin: Repenser la monnaie (Bitcoin: rethinking money)
Bitcoin: Repenser la monnaie (Bitcoin: rethinking money)
 
Les Alternatives à la Blockchain
Les Alternatives à la BlockchainLes Alternatives à la Blockchain
Les Alternatives à la Blockchain
 

Semelhante a Solving Authentication Problems with Better Security Solutions

Authenticationtechnologies 120711134100-phpapp01
Authenticationtechnologies 120711134100-phpapp01Authenticationtechnologies 120711134100-phpapp01
Authenticationtechnologies 120711134100-phpapp01Hai Nguyen
 
Webinar: Beyond Two-Factor: Secure Access Control for Office 365
 Webinar: Beyond Two-Factor: Secure Access Control for Office 365 Webinar: Beyond Two-Factor: Secure Access Control for Office 365
Webinar: Beyond Two-Factor: Secure Access Control for Office 365SecureAuth
 
A Guide To Single Sign-On for IBM Collaboration Solutions
A Guide To Single Sign-On for IBM Collaboration SolutionsA Guide To Single Sign-On for IBM Collaboration Solutions
A Guide To Single Sign-On for IBM Collaboration SolutionsGabriella Davis
 
Authentication Technologies
Authentication TechnologiesAuthentication Technologies
Authentication TechnologiesNicholas Davis
 
Authentication technologies
Authentication technologiesAuthentication technologies
Authentication technologiesNicholas Davis
 
Cybersecurity Awareness Session by Adam
Cybersecurity Awareness Session by AdamCybersecurity Awareness Session by Adam
Cybersecurity Awareness Session by AdamMohammed Adam
 
Community IT Innovators - IT Security Best Practices
Community IT Innovators - IT Security Best PracticesCommunity IT Innovators - IT Security Best Practices
Community IT Innovators - IT Security Best PracticesCommunity IT Innovators
 
Marcos de Pedro Neoris authenware_cybersecurity step1
Marcos de Pedro Neoris authenware_cybersecurity step1Marcos de Pedro Neoris authenware_cybersecurity step1
Marcos de Pedro Neoris authenware_cybersecurity step1Marcos De Pedro
 
#MFSummit2016 Secure: Mind the gap strengthening the information security model
#MFSummit2016 Secure: Mind the gap strengthening the information security model#MFSummit2016 Secure: Mind the gap strengthening the information security model
#MFSummit2016 Secure: Mind the gap strengthening the information security modelMicro Focus
 
Lock it Down: Access Control for IBM i
Lock it Down: Access Control for IBM iLock it Down: Access Control for IBM i
Lock it Down: Access Control for IBM iPrecisely
 
Eds user authenticationuser authentication methods
Eds user authenticationuser authentication methodsEds user authenticationuser authentication methods
Eds user authenticationuser authentication methodslapao2014
 
Cloud Security: A matter of trust?
Cloud Security: A matter of trust?Cloud Security: A matter of trust?
Cloud Security: A matter of trust?Mark Williams
 
Essential Layers of IBM i Security: System-Access Security
Essential Layers of IBM i Security: System-Access SecurityEssential Layers of IBM i Security: System-Access Security
Essential Layers of IBM i Security: System-Access SecurityPrecisely
 
Expand Your Control of Access to IBM i Systems and Data
Expand Your Control of Access to IBM i Systems and DataExpand Your Control of Access to IBM i Systems and Data
Expand Your Control of Access to IBM i Systems and DataPrecisely
 
2012 06-19 --ncc_group_-_iet_seminar_-_mobile_apps_and_secure_by_design
2012 06-19 --ncc_group_-_iet_seminar_-_mobile_apps_and_secure_by_design2012 06-19 --ncc_group_-_iet_seminar_-_mobile_apps_and_secure_by_design
2012 06-19 --ncc_group_-_iet_seminar_-_mobile_apps_and_secure_by_designNCC Group
 
WSO2Con EU 2015: Keynote - The Identity of Things: The Next Internet Challenge
WSO2Con EU 2015: Keynote - The Identity of Things: The Next Internet ChallengeWSO2Con EU 2015: Keynote - The Identity of Things: The Next Internet Challenge
WSO2Con EU 2015: Keynote - The Identity of Things: The Next Internet ChallengeWSO2
 
Controlling Access to IBM i Systems and Data
Controlling Access to IBM i Systems and DataControlling Access to IBM i Systems and Data
Controlling Access to IBM i Systems and DataPrecisely
 
Cloud Software - Cloud-based System Security
Cloud Software - Cloud-based System SecurityCloud Software - Cloud-based System Security
Cloud Software - Cloud-based System SecurityNet at Work
 
Security Considerations for Microservices and Multi cloud
Security Considerations for Microservices and Multi cloudSecurity Considerations for Microservices and Multi cloud
Security Considerations for Microservices and Multi cloudNeelkamal Gaharwar
 

Semelhante a Solving Authentication Problems with Better Security Solutions (20)

Authenticationtechnologies 120711134100-phpapp01
Authenticationtechnologies 120711134100-phpapp01Authenticationtechnologies 120711134100-phpapp01
Authenticationtechnologies 120711134100-phpapp01
 
Webinar: Beyond Two-Factor: Secure Access Control for Office 365
 Webinar: Beyond Two-Factor: Secure Access Control for Office 365 Webinar: Beyond Two-Factor: Secure Access Control for Office 365
Webinar: Beyond Two-Factor: Secure Access Control for Office 365
 
A Guide To Single Sign-On for IBM Collaboration Solutions
A Guide To Single Sign-On for IBM Collaboration SolutionsA Guide To Single Sign-On for IBM Collaboration Solutions
A Guide To Single Sign-On for IBM Collaboration Solutions
 
Authentication Technologies
Authentication TechnologiesAuthentication Technologies
Authentication Technologies
 
Authentication technologies
Authentication technologiesAuthentication technologies
Authentication technologies
 
Cybersecurity Awareness Session by Adam
Cybersecurity Awareness Session by AdamCybersecurity Awareness Session by Adam
Cybersecurity Awareness Session by Adam
 
Community IT Innovators - IT Security Best Practices
Community IT Innovators - IT Security Best PracticesCommunity IT Innovators - IT Security Best Practices
Community IT Innovators - IT Security Best Practices
 
Marcos de Pedro Neoris authenware_cybersecurity step1
Marcos de Pedro Neoris authenware_cybersecurity step1Marcos de Pedro Neoris authenware_cybersecurity step1
Marcos de Pedro Neoris authenware_cybersecurity step1
 
#MFSummit2016 Secure: Mind the gap strengthening the information security model
#MFSummit2016 Secure: Mind the gap strengthening the information security model#MFSummit2016 Secure: Mind the gap strengthening the information security model
#MFSummit2016 Secure: Mind the gap strengthening the information security model
 
Lock it Down: Access Control for IBM i
Lock it Down: Access Control for IBM iLock it Down: Access Control for IBM i
Lock it Down: Access Control for IBM i
 
Eds user authenticationuser authentication methods
Eds user authenticationuser authentication methodsEds user authenticationuser authentication methods
Eds user authenticationuser authentication methods
 
Cloud Security: A matter of trust?
Cloud Security: A matter of trust?Cloud Security: A matter of trust?
Cloud Security: A matter of trust?
 
Essential Layers of IBM i Security: System-Access Security
Essential Layers of IBM i Security: System-Access SecurityEssential Layers of IBM i Security: System-Access Security
Essential Layers of IBM i Security: System-Access Security
 
Expand Your Control of Access to IBM i Systems and Data
Expand Your Control of Access to IBM i Systems and DataExpand Your Control of Access to IBM i Systems and Data
Expand Your Control of Access to IBM i Systems and Data
 
2012 06-19 --ncc_group_-_iet_seminar_-_mobile_apps_and_secure_by_design
2012 06-19 --ncc_group_-_iet_seminar_-_mobile_apps_and_secure_by_design2012 06-19 --ncc_group_-_iet_seminar_-_mobile_apps_and_secure_by_design
2012 06-19 --ncc_group_-_iet_seminar_-_mobile_apps_and_secure_by_design
 
A Better Method of Authentication
A Better Method of AuthenticationA Better Method of Authentication
A Better Method of Authentication
 
WSO2Con EU 2015: Keynote - The Identity of Things: The Next Internet Challenge
WSO2Con EU 2015: Keynote - The Identity of Things: The Next Internet ChallengeWSO2Con EU 2015: Keynote - The Identity of Things: The Next Internet Challenge
WSO2Con EU 2015: Keynote - The Identity of Things: The Next Internet Challenge
 
Controlling Access to IBM i Systems and Data
Controlling Access to IBM i Systems and DataControlling Access to IBM i Systems and Data
Controlling Access to IBM i Systems and Data
 
Cloud Software - Cloud-based System Security
Cloud Software - Cloud-based System SecurityCloud Software - Cloud-based System Security
Cloud Software - Cloud-based System Security
 
Security Considerations for Microservices and Multi cloud
Security Considerations for Microservices and Multi cloudSecurity Considerations for Microservices and Multi cloud
Security Considerations for Microservices and Multi cloud
 

Mais de MecklerMedia

Global Capital Markets & Industry Outlook
Global Capital Markets & Industry OutlookGlobal Capital Markets & Industry Outlook
Global Capital Markets & Industry OutlookMecklerMedia
 
Cognitive Reasoning Platforms – Spinning Social Media Interactions into Gold
Cognitive Reasoning Platforms – Spinning Social Media Interactions into GoldCognitive Reasoning Platforms – Spinning Social Media Interactions into Gold
Cognitive Reasoning Platforms – Spinning Social Media Interactions into GoldMecklerMedia
 
Cognitive Reasoning Platforms – Spinning Social Media Interactions into Gold
Cognitive Reasoning Platforms – Spinning Social Media Interactions into GoldCognitive Reasoning Platforms – Spinning Social Media Interactions into Gold
Cognitive Reasoning Platforms – Spinning Social Media Interactions into GoldMecklerMedia
 
Why Bitcoin’s Rate of Adoption is Only Going to Increase
Why Bitcoin’s Rate of Adoption is Only Going to IncreaseWhy Bitcoin’s Rate of Adoption is Only Going to Increase
Why Bitcoin’s Rate of Adoption is Only Going to IncreaseMecklerMedia
 
Cognitive Reasoning Platforms – Spinning Social Media Interactions into Gold
Cognitive Reasoning Platforms – Spinning Social Media Interactions into GoldCognitive Reasoning Platforms – Spinning Social Media Interactions into Gold
Cognitive Reasoning Platforms – Spinning Social Media Interactions into GoldMecklerMedia
 
Building a Robotics Hub in San Diego
Building a Robotics Hub in San DiegoBuilding a Robotics Hub in San Diego
Building a Robotics Hub in San DiegoMecklerMedia
 
Blockchain Technology: A Technical Introduction to Non-Technical People
Blockchain Technology: A Technical Introduction to Non-Technical PeopleBlockchain Technology: A Technical Introduction to Non-Technical People
Blockchain Technology: A Technical Introduction to Non-Technical PeopleMecklerMedia
 
Inside 3 d printing 2015
Inside 3 d printing 2015Inside 3 d printing 2015
Inside 3 d printing 2015MecklerMedia
 
Quality assurance, repeatability and monitoring on additive manufacturing.ppt...
Quality assurance, repeatability and monitoring on additive manufacturing.ppt...Quality assurance, repeatability and monitoring on additive manufacturing.ppt...
Quality assurance, repeatability and monitoring on additive manufacturing.ppt...MecklerMedia
 
Designing for the dmls process oct2015
Designing for the dmls process oct2015Designing for the dmls process oct2015
Designing for the dmls process oct2015MecklerMedia
 
Inside 3 d printing presentation lisa
Inside 3 d printing presentation lisaInside 3 d printing presentation lisa
Inside 3 d printing presentation lisaMecklerMedia
 
Inside3 dp santa clara 22oct2015 via tuan tranpham
Inside3 dp santa clara 22oct2015 via tuan tranphamInside3 dp santa clara 22oct2015 via tuan tranpham
Inside3 dp santa clara 22oct2015 via tuan tranphamMecklerMedia
 
Efesto presentation kunal varma
Efesto presentation  kunal varmaEfesto presentation  kunal varma
Efesto presentation kunal varmaMecklerMedia
 
Infra trac 3d-102115-summaryslide
Infra trac 3d-102115-summaryslideInfra trac 3d-102115-summaryslide
Infra trac 3d-102115-summaryslideMecklerMedia
 
V rin construction-7
V rin construction-7V rin construction-7
V rin construction-7MecklerMedia
 
I3 dp tc santa clara oct2015 distro v2
I3 dp tc santa clara oct2015 distro v2I3 dp tc santa clara oct2015 distro v2
I3 dp tc santa clara oct2015 distro v2MecklerMedia
 
I3 dp 2015_cricket-labs
I3 dp 2015_cricket-labsI3 dp 2015_cricket-labs
I3 dp 2015_cricket-labsMecklerMedia
 
Inside bitcoins chicago short
Inside bitcoins chicago shortInside bitcoins chicago short
Inside bitcoins chicago shortMecklerMedia
 
Bitcoin Speculation
Bitcoin SpeculationBitcoin Speculation
Bitcoin SpeculationMecklerMedia
 

Mais de MecklerMedia (19)

Global Capital Markets & Industry Outlook
Global Capital Markets & Industry OutlookGlobal Capital Markets & Industry Outlook
Global Capital Markets & Industry Outlook
 
Cognitive Reasoning Platforms – Spinning Social Media Interactions into Gold
Cognitive Reasoning Platforms – Spinning Social Media Interactions into GoldCognitive Reasoning Platforms – Spinning Social Media Interactions into Gold
Cognitive Reasoning Platforms – Spinning Social Media Interactions into Gold
 
Cognitive Reasoning Platforms – Spinning Social Media Interactions into Gold
Cognitive Reasoning Platforms – Spinning Social Media Interactions into GoldCognitive Reasoning Platforms – Spinning Social Media Interactions into Gold
Cognitive Reasoning Platforms – Spinning Social Media Interactions into Gold
 
Why Bitcoin’s Rate of Adoption is Only Going to Increase
Why Bitcoin’s Rate of Adoption is Only Going to IncreaseWhy Bitcoin’s Rate of Adoption is Only Going to Increase
Why Bitcoin’s Rate of Adoption is Only Going to Increase
 
Cognitive Reasoning Platforms – Spinning Social Media Interactions into Gold
Cognitive Reasoning Platforms – Spinning Social Media Interactions into GoldCognitive Reasoning Platforms – Spinning Social Media Interactions into Gold
Cognitive Reasoning Platforms – Spinning Social Media Interactions into Gold
 
Building a Robotics Hub in San Diego
Building a Robotics Hub in San DiegoBuilding a Robotics Hub in San Diego
Building a Robotics Hub in San Diego
 
Blockchain Technology: A Technical Introduction to Non-Technical People
Blockchain Technology: A Technical Introduction to Non-Technical PeopleBlockchain Technology: A Technical Introduction to Non-Technical People
Blockchain Technology: A Technical Introduction to Non-Technical People
 
Inside 3 d printing 2015
Inside 3 d printing 2015Inside 3 d printing 2015
Inside 3 d printing 2015
 
Quality assurance, repeatability and monitoring on additive manufacturing.ppt...
Quality assurance, repeatability and monitoring on additive manufacturing.ppt...Quality assurance, repeatability and monitoring on additive manufacturing.ppt...
Quality assurance, repeatability and monitoring on additive manufacturing.ppt...
 
Designing for the dmls process oct2015
Designing for the dmls process oct2015Designing for the dmls process oct2015
Designing for the dmls process oct2015
 
Inside 3 d printing presentation lisa
Inside 3 d printing presentation lisaInside 3 d printing presentation lisa
Inside 3 d printing presentation lisa
 
Inside3 dp santa clara 22oct2015 via tuan tranpham
Inside3 dp santa clara 22oct2015 via tuan tranphamInside3 dp santa clara 22oct2015 via tuan tranpham
Inside3 dp santa clara 22oct2015 via tuan tranpham
 
Efesto presentation kunal varma
Efesto presentation  kunal varmaEfesto presentation  kunal varma
Efesto presentation kunal varma
 
Infra trac 3d-102115-summaryslide
Infra trac 3d-102115-summaryslideInfra trac 3d-102115-summaryslide
Infra trac 3d-102115-summaryslide
 
V rin construction-7
V rin construction-7V rin construction-7
V rin construction-7
 
I3 dp tc santa clara oct2015 distro v2
I3 dp tc santa clara oct2015 distro v2I3 dp tc santa clara oct2015 distro v2
I3 dp tc santa clara oct2015 distro v2
 
I3 dp 2015_cricket-labs
I3 dp 2015_cricket-labsI3 dp 2015_cricket-labs
I3 dp 2015_cricket-labs
 
Inside bitcoins chicago short
Inside bitcoins chicago shortInside bitcoins chicago short
Inside bitcoins chicago short
 
Bitcoin Speculation
Bitcoin SpeculationBitcoin Speculation
Bitcoin Speculation
 

Último

WhatsApp 📞 Call : 9892124323 ✅Call Girls In Chembur ( Mumbai ) secure service
WhatsApp 📞 Call : 9892124323  ✅Call Girls In Chembur ( Mumbai ) secure serviceWhatsApp 📞 Call : 9892124323  ✅Call Girls In Chembur ( Mumbai ) secure service
WhatsApp 📞 Call : 9892124323 ✅Call Girls In Chembur ( Mumbai ) secure servicePooja Nehwal
 
Pooja 9892124323 : Call Girl in Juhu Escorts Service Free Home Delivery
Pooja 9892124323 : Call Girl in Juhu Escorts Service Free Home DeliveryPooja 9892124323 : Call Girl in Juhu Escorts Service Free Home Delivery
Pooja 9892124323 : Call Girl in Juhu Escorts Service Free Home DeliveryPooja Nehwal
 
The Economic History of the U.S. Lecture 17.pdf
The Economic History of the U.S. Lecture 17.pdfThe Economic History of the U.S. Lecture 17.pdf
The Economic History of the U.S. Lecture 17.pdfGale Pooley
 
Booking open Available Pune Call Girls Talegaon Dabhade 6297143586 Call Hot ...
Booking open Available Pune Call Girls Talegaon Dabhade  6297143586 Call Hot ...Booking open Available Pune Call Girls Talegaon Dabhade  6297143586 Call Hot ...
Booking open Available Pune Call Girls Talegaon Dabhade 6297143586 Call Hot ...Call Girls in Nagpur High Profile
 
High Class Call Girls Nagpur Grishma Call 7001035870 Meet With Nagpur Escorts
High Class Call Girls Nagpur Grishma Call 7001035870 Meet With Nagpur EscortsHigh Class Call Girls Nagpur Grishma Call 7001035870 Meet With Nagpur Escorts
High Class Call Girls Nagpur Grishma Call 7001035870 Meet With Nagpur Escortsranjana rawat
 
Solution Manual for Financial Accounting, 11th Edition by Robert Libby, Patri...
Solution Manual for Financial Accounting, 11th Edition by Robert Libby, Patri...Solution Manual for Financial Accounting, 11th Edition by Robert Libby, Patri...
Solution Manual for Financial Accounting, 11th Edition by Robert Libby, Patri...ssifa0344
 
Stock Market Brief Deck (Under Pressure).pdf
Stock Market Brief Deck (Under Pressure).pdfStock Market Brief Deck (Under Pressure).pdf
Stock Market Brief Deck (Under Pressure).pdfMichael Silva
 
Booking open Available Pune Call Girls Wadgaon Sheri 6297143586 Call Hot Ind...
Booking open Available Pune Call Girls Wadgaon Sheri  6297143586 Call Hot Ind...Booking open Available Pune Call Girls Wadgaon Sheri  6297143586 Call Hot Ind...
Booking open Available Pune Call Girls Wadgaon Sheri 6297143586 Call Hot Ind...Call Girls in Nagpur High Profile
 
The Economic History of the U.S. Lecture 18.pdf
The Economic History of the U.S. Lecture 18.pdfThe Economic History of the U.S. Lecture 18.pdf
The Economic History of the U.S. Lecture 18.pdfGale Pooley
 
Booking open Available Pune Call Girls Shivane 6297143586 Call Hot Indian Gi...
Booking open Available Pune Call Girls Shivane  6297143586 Call Hot Indian Gi...Booking open Available Pune Call Girls Shivane  6297143586 Call Hot Indian Gi...
Booking open Available Pune Call Girls Shivane 6297143586 Call Hot Indian Gi...Call Girls in Nagpur High Profile
 
06_Joeri Van Speybroek_Dell_MeetupDora&Cybersecurity.pdf
06_Joeri Van Speybroek_Dell_MeetupDora&Cybersecurity.pdf06_Joeri Van Speybroek_Dell_MeetupDora&Cybersecurity.pdf
06_Joeri Van Speybroek_Dell_MeetupDora&Cybersecurity.pdfFinTech Belgium
 
The Economic History of the U.S. Lecture 22.pdf
The Economic History of the U.S. Lecture 22.pdfThe Economic History of the U.S. Lecture 22.pdf
The Economic History of the U.S. Lecture 22.pdfGale Pooley
 
High Class Call Girls Nashik Maya 7001305949 Independent Escort Service Nashik
High Class Call Girls Nashik Maya 7001305949 Independent Escort Service NashikHigh Class Call Girls Nashik Maya 7001305949 Independent Escort Service Nashik
High Class Call Girls Nashik Maya 7001305949 Independent Escort Service NashikCall Girls in Nagpur High Profile
 
VVIP Pune Call Girls Katraj (7001035870) Pune Escorts Nearby with Complete Sa...
VVIP Pune Call Girls Katraj (7001035870) Pune Escorts Nearby with Complete Sa...VVIP Pune Call Girls Katraj (7001035870) Pune Escorts Nearby with Complete Sa...
VVIP Pune Call Girls Katraj (7001035870) Pune Escorts Nearby with Complete Sa...Call Girls in Nagpur High Profile
 
Call US 📞 9892124323 ✅ Kurla Call Girls In Kurla ( Mumbai ) secure service
Call US 📞 9892124323 ✅ Kurla Call Girls In Kurla ( Mumbai ) secure serviceCall US 📞 9892124323 ✅ Kurla Call Girls In Kurla ( Mumbai ) secure service
Call US 📞 9892124323 ✅ Kurla Call Girls In Kurla ( Mumbai ) secure servicePooja Nehwal
 
Best VIP Call Girls Noida Sector 18 Call Me: 8448380779
Best VIP Call Girls Noida Sector 18 Call Me: 8448380779Best VIP Call Girls Noida Sector 18 Call Me: 8448380779
Best VIP Call Girls Noida Sector 18 Call Me: 8448380779Delhi Call girls
 

Último (20)

VIP Call Girl Service Andheri West ⚡ 9920725232 What It Takes To Be The Best ...
VIP Call Girl Service Andheri West ⚡ 9920725232 What It Takes To Be The Best ...VIP Call Girl Service Andheri West ⚡ 9920725232 What It Takes To Be The Best ...
VIP Call Girl Service Andheri West ⚡ 9920725232 What It Takes To Be The Best ...
 
(Vedika) Low Rate Call Girls in Pune Call Now 8250077686 Pune Escorts 24x7
(Vedika) Low Rate Call Girls in Pune Call Now 8250077686 Pune Escorts 24x7(Vedika) Low Rate Call Girls in Pune Call Now 8250077686 Pune Escorts 24x7
(Vedika) Low Rate Call Girls in Pune Call Now 8250077686 Pune Escorts 24x7
 
WhatsApp 📞 Call : 9892124323 ✅Call Girls In Chembur ( Mumbai ) secure service
WhatsApp 📞 Call : 9892124323  ✅Call Girls In Chembur ( Mumbai ) secure serviceWhatsApp 📞 Call : 9892124323  ✅Call Girls In Chembur ( Mumbai ) secure service
WhatsApp 📞 Call : 9892124323 ✅Call Girls In Chembur ( Mumbai ) secure service
 
Pooja 9892124323 : Call Girl in Juhu Escorts Service Free Home Delivery
Pooja 9892124323 : Call Girl in Juhu Escorts Service Free Home DeliveryPooja 9892124323 : Call Girl in Juhu Escorts Service Free Home Delivery
Pooja 9892124323 : Call Girl in Juhu Escorts Service Free Home Delivery
 
The Economic History of the U.S. Lecture 17.pdf
The Economic History of the U.S. Lecture 17.pdfThe Economic History of the U.S. Lecture 17.pdf
The Economic History of the U.S. Lecture 17.pdf
 
Booking open Available Pune Call Girls Talegaon Dabhade 6297143586 Call Hot ...
Booking open Available Pune Call Girls Talegaon Dabhade  6297143586 Call Hot ...Booking open Available Pune Call Girls Talegaon Dabhade  6297143586 Call Hot ...
Booking open Available Pune Call Girls Talegaon Dabhade 6297143586 Call Hot ...
 
High Class Call Girls Nagpur Grishma Call 7001035870 Meet With Nagpur Escorts
High Class Call Girls Nagpur Grishma Call 7001035870 Meet With Nagpur EscortsHigh Class Call Girls Nagpur Grishma Call 7001035870 Meet With Nagpur Escorts
High Class Call Girls Nagpur Grishma Call 7001035870 Meet With Nagpur Escorts
 
Solution Manual for Financial Accounting, 11th Edition by Robert Libby, Patri...
Solution Manual for Financial Accounting, 11th Edition by Robert Libby, Patri...Solution Manual for Financial Accounting, 11th Edition by Robert Libby, Patri...
Solution Manual for Financial Accounting, 11th Edition by Robert Libby, Patri...
 
Stock Market Brief Deck (Under Pressure).pdf
Stock Market Brief Deck (Under Pressure).pdfStock Market Brief Deck (Under Pressure).pdf
Stock Market Brief Deck (Under Pressure).pdf
 
Booking open Available Pune Call Girls Wadgaon Sheri 6297143586 Call Hot Ind...
Booking open Available Pune Call Girls Wadgaon Sheri  6297143586 Call Hot Ind...Booking open Available Pune Call Girls Wadgaon Sheri  6297143586 Call Hot Ind...
Booking open Available Pune Call Girls Wadgaon Sheri 6297143586 Call Hot Ind...
 
The Economic History of the U.S. Lecture 18.pdf
The Economic History of the U.S. Lecture 18.pdfThe Economic History of the U.S. Lecture 18.pdf
The Economic History of the U.S. Lecture 18.pdf
 
Booking open Available Pune Call Girls Shivane 6297143586 Call Hot Indian Gi...
Booking open Available Pune Call Girls Shivane  6297143586 Call Hot Indian Gi...Booking open Available Pune Call Girls Shivane  6297143586 Call Hot Indian Gi...
Booking open Available Pune Call Girls Shivane 6297143586 Call Hot Indian Gi...
 
06_Joeri Van Speybroek_Dell_MeetupDora&Cybersecurity.pdf
06_Joeri Van Speybroek_Dell_MeetupDora&Cybersecurity.pdf06_Joeri Van Speybroek_Dell_MeetupDora&Cybersecurity.pdf
06_Joeri Van Speybroek_Dell_MeetupDora&Cybersecurity.pdf
 
The Economic History of the U.S. Lecture 22.pdf
The Economic History of the U.S. Lecture 22.pdfThe Economic History of the U.S. Lecture 22.pdf
The Economic History of the U.S. Lecture 22.pdf
 
Veritas Interim Report 1 January–31 March 2024
Veritas Interim Report 1 January–31 March 2024Veritas Interim Report 1 January–31 March 2024
Veritas Interim Report 1 January–31 March 2024
 
High Class Call Girls Nashik Maya 7001305949 Independent Escort Service Nashik
High Class Call Girls Nashik Maya 7001305949 Independent Escort Service NashikHigh Class Call Girls Nashik Maya 7001305949 Independent Escort Service Nashik
High Class Call Girls Nashik Maya 7001305949 Independent Escort Service Nashik
 
VVIP Pune Call Girls Katraj (7001035870) Pune Escorts Nearby with Complete Sa...
VVIP Pune Call Girls Katraj (7001035870) Pune Escorts Nearby with Complete Sa...VVIP Pune Call Girls Katraj (7001035870) Pune Escorts Nearby with Complete Sa...
VVIP Pune Call Girls Katraj (7001035870) Pune Escorts Nearby with Complete Sa...
 
VIP Independent Call Girls in Bandra West 🌹 9920725232 ( Call Me ) Mumbai Esc...
VIP Independent Call Girls in Bandra West 🌹 9920725232 ( Call Me ) Mumbai Esc...VIP Independent Call Girls in Bandra West 🌹 9920725232 ( Call Me ) Mumbai Esc...
VIP Independent Call Girls in Bandra West 🌹 9920725232 ( Call Me ) Mumbai Esc...
 
Call US 📞 9892124323 ✅ Kurla Call Girls In Kurla ( Mumbai ) secure service
Call US 📞 9892124323 ✅ Kurla Call Girls In Kurla ( Mumbai ) secure serviceCall US 📞 9892124323 ✅ Kurla Call Girls In Kurla ( Mumbai ) secure service
Call US 📞 9892124323 ✅ Kurla Call Girls In Kurla ( Mumbai ) secure service
 
Best VIP Call Girls Noida Sector 18 Call Me: 8448380779
Best VIP Call Girls Noida Sector 18 Call Me: 8448380779Best VIP Call Girls Noida Sector 18 Call Me: 8448380779
Best VIP Call Girls Noida Sector 18 Call Me: 8448380779
 

Solving Authentication Problems with Better Security Solutions

  • 2. Yo Sub Kwon Co-founder of Launchkey
  • 3.
  • 4.
  • 5.
  • 6.
  • 7.
  • 8. Attacks • Compromised credentials of a privileged account • Direct access to cloud servers or hardware containing wallets or credentials • Compromised credentials on a mass scale of users with weak or shared passwords • Weak or compromised API keys • Trojans and Keyloggers • Bitcoin specialized malicious software
  • 9. Kill Passwords Along with many in the industry, we feel passwords and simple bearer tokens such as cookies are no longer sufficient to keep users safe -Google Vice President of Security Eric Grosse Using passwords for security is no longer safe for people -Jonathan LeBlanc, PayPal’s head of global developer advocacy FIDO hopes to make passwords a thing of the past -Kayvan Alikhani, senior director of technology at RSA
  • 10. Passwords are insecure • They’re inherently susceptible to brute-force attacks • They are typically stored in-band on servers (and elsewhere) while a knowledge factor of authentication is only effective so long as the individual retains sole possession of that secret. • They’re susceptible to human error by both the individuals that utilize passwords and the developers that implement them • Cracking hashed passwords becomes progressively easier with our ever increasing computing power • Due to password re-use, one password breach can result in obtaining credentials for multiple unrelated services
  • 11. Common Patches • Minimum password requirements • Password expirations • More passwords • One time passwords (OTP) as a second factor • Social Media logins
  • 12. Problems • Passwords are insecure • Multifactor authentication is technically complex • Out of band hardware is costly • New authentication measures can be disruptive to business
  • 13. Solutions – Passwords are insecure • Remove passwords • Authentication using mobile devices (BYOD) • Biometric authentication • Physical devices such as USB keys or wearables
  • 14. Solutions - Multifactor complexity • Decentralize the layer of authentication • Don’t do your own security • Fidoalliance.org
  • 15. Solutions – Disruptive to business • Offer multiple options to login • Passive factors of authentication
  • 16. Conclusions • Better security doesn’t need to be more difficult • Placing patches on authentication problems is not future-proof • Better security and easier to use authentication solutions do exist Encourage the services you use to offer them for their sake and yours